[Bug 2333] New: forbid old Ciphers, KexAlgorithms and MACs by default

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Thu Jan 8 05:38:57 AEDT 2015


https://bugzilla.mindrot.org/show_bug.cgi?id=2333

            Bug ID: 2333
           Summary: forbid old Ciphers, KexAlgorithms and MACs by default
           Product: Portable OpenSSH
           Version: 6.6p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Miscellaneous
          Assignee: unassigned-bugs at mindrot.org
          Reporter: kolAflash at kolahilft.de

OpenSSH shouldn't allow old Ciphers, KexAlgorithms and MACs by default,
if they are not explicitly enabled in the the servers or users
configuration file.
(should be still possible to enable those by configuration file, if
user wishes so)


I'm thinking of disabling (by default) these:
Ciphers
  arcfour256,
  arcfour128,
  3des-cbc,
  arcfour

Maybe also disable by default:
Ciphers
  blowfish-cbc,
  cast128-cbc,
  aes192-cbc,
  aes256-cbc
I'm not quite sure about these.
Especially about blowfish. I guess it's deprecated by twofish?

Also disable these (by default):
KexAlgorithms
  diffie-hellman-group-exchange-sha1,
  diffie-hellman-group14-sha1,
  diffie-hellman-group1-sha1

And disable these (by default):
MACs
  hmac-md5-etm at openssh.com,
  hmac-sha1-etm at openssh.com,
  umac-64-etm at openssh.com,
  hmac-sha1-96-etm at openssh.com,
  hmac-md5-96-etm at openssh.com,
  hmac-md5,hmac-sha1,
  umac-64 at openssh.com,
  hmac-sha1-96,
  hmac-md5-96


Maybe NIST curves should be disabled by default too.
At least since OpenSSH has ed25519!


--

These are the algorithms I currently got enabled:

KexAlgorithms
curve25519-sha256 at libssh.org,diffie-hellman-group-exchange-sha256

Ciphers
chacha20-poly1305 at openssh.com,aes256-gcm at openssh.com,aes128-gcm at openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

MACs
hmac-sha2-512-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-ripemd160-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,hmac-ripemd160 at openssh.com


These are my sources of information:

https://stribika.github.io/2015/01/04/secure-secure-shell.html

https://bettercrypto.org/static/applied-crypto-hardening.pdf

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list